Mehdi Khabazian's research while affiliated with Qatar Solar Technologies and other places

Publications (21)

Article
Cooperative communication (CC) has been introduced as an effective technique to combat the detrimental effects of channel fading by exploiting spatial diversity gain, resulting in improved throughput and network performance. CC provides an opportunity for single antenna nodes to share their resources and construct a virtual antenna array at a lower...
Article
In this article, a cooperative medium access control (MAC) protocol called cooperative cognitive TDMA (CC-TDMA) for cognitive networks is proposed, which is based on time division multiple access (TDMA). The proposed protocol guarantees the quality of service (QoS) required by the primary network. In this regard, licensed users lease part of their...
Conference Paper
Femtocell is a promising technology that will improve wireless resources efficiency through frequency spatial reuse however, its integration with the current cellular systems has been considered a fundamental challenge. In this study, we propose a mechanism by which the femto and macro capacity resources are jointly priced according to a dynamic pr...
Conference Paper
In this paper, we propose a bandwidth adaptation mechanism for 3GPP LTE which partially releases bearers' resources for admission of a new bearer during congestion periods. Each active bearer may contribute into the downgrading mechanism up to its minimum resource requirement according to a bearer contribution attribute called the “downgrading inde...
Article
Full-text available
In vehicular ad hoc networks (VANETs), because all vehicles in range are shown as destination nodes and less time is spent for the medium access process, broadcast communication is considered a highly appropriate technique for the dissemination of safety messages in such networks. However, the lack of request-to-send/clear-to-send handshaking and p...
Article
Full-text available
In this paper, we present a novel analytical model for the service delay in IEEE 802.11 networks. This model is capable of closely tracking service delay's behavior in real wireless local area networks. We find a compact closed-form expression for the probability-generating function (PGF) of service delay using which all higher-order moments are ac...
Article
One of the radio resource management (RRM) functionalities in LTE systems, call admission control (CAC) is employed to control the number of LTE bearer requests in order to maintain the quality of service (QoS) of the admitted bearers. However, no quality guarantee can be provided due to the inherently dynamic nature of wireless communication. For...
Conference Paper
In this paper, we propose a fairness-based preemption algorithm for 3GPP LTE-Advanced. It considers bearers' priorities as well as their QoS over-provisioning with respect to their minimum QoS needs into the partial preemption decision. We define a preemption contribution metric for each established bearer and we evaluate the proposed scheme both i...
Article
Full-text available
In this paper, we present an analytical study for the performance of a two-tier primary-secondary network based on IEEE 802.11 DCF mechanism. It is assumed that multiple primary users (PUs) and secondary users (SUs) coexist in the radio environment and share a single band such that the SUs are allowed to contend only if they sense the channel idle...
Article
In OFDM wireless networks, the radio resources are assigned to the users based on their quality of service needs and depending on their channel quality. Thus, during a call session, the bandwidth requirements and needed radio resources may increase from negotiated call setup resources. In this study, we propose a call admission control reservation...
Conference Paper
In this paper, we study the performance of a network comprised of a primary user and a secondary user with the latter having cognitive radio capabilities. The secondary node uses the empty slots of the primary user to transmit its own traffic as well as to relay the primary's traffic in a cooperative fashion. Taking a queuing theory approach, we fi...
Conference Paper
Full-text available
In this paper, we study the performance of a two- tier primary-secondary network based on IEEE 802.11 broadcast scheme. We assume that a number of primary and secondary users coexist in the radio environment and share a single band. To protect the primary users' priority, the secondary users are allowed to contend for the channel only if they sense...
Article
Full-text available
In this paper, we present an analytical study for the performance of message dissemination in vehicular ad hoc networks (VANETs) with two priority classes. It is assumed that the message traffic generated by event-driven safety applications has higher priority compared to the remaining network traffic. First, we derive the distribution of the numbe...
Conference Paper
Vehicular ad hoc networks (VANETs) have been proposed to provide safety and non-safety services for the passengers on board. Reliability in broadcasting of safety messages is one of the fundamental challenges in the design of such networks. In this paper, we study the impact of employment of repetition and piggybacking techniques on the performance...
Conference Paper
This paper proposes a novel routing protocol for multi-service wireless mesh networks (WMNs). Our protocol provisions quality of service (QoS) using bandwidth reservation and bandwidth splitting mechanisms in the network layer and enhanced distributed contention access mechanism in the MAC layer. A performance analysis is conducted and the results...
Conference Paper
In this paper, we present an analytical study for the performance of message dissemination in vehicular ad hoc networks (VANETs) at the steady state. First, we find the probability that a receiving node is exposed to collisions and hidden terminal activities in a multi-hop VANET using a novel approach. Based on this result, we then derive the distr...
Conference Paper
In this paper, we study the statistical properties of continuous communication path availability in vehicular ad hoc networks at the steady state. We assume a network of highways with arbitrary topology. The nodes arrive at the network through one of the traffic entry points following a Poisson process and move along a path according to a mobility...
Article
In this paper, we study the statistical properties of the connectivity of vehicular ad hoc networks (VANETs) with user mobility. It is assumed that the nodes travel along a multilane highway that allows vehicles to pass each other. The nodes arrive at the highway through one of the traffic entry points according to a Poisson process and then travel...
Conference Paper
In this paper, we study the statistical properties of the connectivity of VANETs with user mobility at the steady state. We assume a network of highways with arbitrary topology. The nodes arrive at the network through one of the traffic entry points following a Poisson process and move within the network according to a mobility model. The path of a...
Conference Paper
In this paper, we study the connectivity of an ad hoc network with a dynamic user population. We assume that the nodes arrive at the service area according to a Poisson process and, then travel according to a user mobility model. The nodes, which have not departed the service area, are able to participate in communications. The location of the node...

Citations

... Cyber-physical systems (CPS) encounter a large volume of data which is added to the system gradually in real time and not altogether in advance as for example in emerging mobility systems [1], networked control systems [2,3], mobility markets [4,5], smart power grids [6,7], power systems [8], cooperative cyber-physical networks [9][10][11], social media platforms [12], cooperation of robots [13][14][15], and internet of things [16][17][18]. In such applications, we typically use a model to derive the optimal control strategy of the system. ...
... All these different subsystems of an energy harvesting powered wireless sensor system are inherently multidisciplinary that require research on materials, 228 applied physics, 480 mechanical designs, 481 electronics, 482 and communication technology. 483 While many promising innovations on the individual subsystems of energy harvesting technologies have been achieved, 484 it is still challenging for the subsystems from different domains to operate in synergy when they are integrated into one system. The challenge mainly lies in the mismatches among the different subsystems of energy harvesting technologies, which can be in terms of their coupling and the powers that are related to generation by the energy harvester and demand by the power management circuit and wireless sensors. ...
... Niu et al. present a congestion pricing model to charge media streaming operators based on the bandwidth-delay product on each overlay link [25]. Khabazian et al. study a mechanism by which the femto and macro capacity resources are jointly priced according to a dynamic pricing-based call admission mechanism [26]. Cheung et al. consider the network selection and data offloading problem in an integrated cellular WiFi system by incorporating the practical considerations [27]. ...
... The basis for the selection of Secondary RAT is the knowledge about the cellular network load. As suggested in [24] and [40], the cellular LTE network load is primarily measured in terms of the number of free Physical Resource Blocks (PRBs) that are available to schedule. Fewer PRB available indicates a higher load in the connected cell and vice versa. ...
... Several models have been proposed in the literature. For example, the authors in [8] and [22] modeled the traffic patterns of PUs using an M /G/1 queue model in which arrivals are Markovian, service times have a general distribution, and the packet arrival process is a Poisson random process with average packet arrival rate λ. While [23]- [26] assumed that the activity of a PU follows the Poisson model, however, [27] argued that such a model neglects the short-term fluctuations as well as the bursty and spiky features of the PU activities. ...
... A multicast is reliable if a message M is sent by a peer, then M is eventually received by every peer exactly once. A reliable multicast is one of the essential building blocks of secure network protocols, defense and safety mechanisms and command and control systems [7]. ...
... The authors in [12] analyzed an accurate MAC delay model, which considered the backoff counter decrementing time. Tadayon et al. [13] proposed a service delay model to track the service delay behavior of 802.11 networks. The authors in [14] studied the fair issue of access to the channel by vehicles with different speeds and its impact on the network throughput. ...
... In the literature, there exist various teletraffic models that study call admission control in OFDM networks [23][24][25][26][27][28]. Their main characteristics are the following: (a) the call arrival process is Poisson, (b) one or two service-classes are considered and (c) the performance measures are determined via simulation or via complex analytical methods. ...
... This scenario is valid inside a city where the vehicle moves slowly and more number of fixed base stations are available. But if the vehicle moves with high speed on a highway outside the city, where there is very little or no roadside units, it is not possible to consider the city model of VANET [10]. Hence the requirement to propose a new model for VANET on a highway. ...
... Several practical scenarios such as cellular networks, satellite communications, and vehicle-to-vehicle (V2V) communications have adopted relaying techniques to utilize their potential attributes. In particular, for extracting features like full spatial diversity, improved traffic congestion, safety, etc., the V2V communications and vehicle-toinfrastructure (V2I) communications have incorporated relaying schemes by considering nodes-mobility (NM) into account [8][9][10]. Specifically, authors in [8] have focused on congestion amelioration whereas authors in [9] have proposed architecture to minimize the spectral scarcity and high mobility issues for vehicular communication systems. ...